{"id":4959,"date":"2021-06-09T08:00:42","date_gmt":"2021-06-09T07:00:42","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4959"},"modified":"2021-06-18T16:12:18","modified_gmt":"2021-06-18T15:12:18","slug":"synthetic-identity-theft-data-breach-claims-advice","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice","title":{"rendered":"Synthetic identity theft \u2013 data breach claims advice"},"content":{"rendered":"<p>Personal data is an incredibly valuable resource for cybercriminals who are developing increasingly sophisticated ways of stealing personal information and using it to commit fraud. Although many people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people. It is a risk that everyone should be aware of in our view, as it is one of the more sophisticated and evasive methods in the current cybercrime landscape.<\/p>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Your Lawyers &#8211; The Data Leak Lawyers \u2013 as leading specialists in data protection claims<\/strong><\/a>, are always looking to raise awareness about data security issues and the potential cybercrime that can result from data breaches. If consumers remain unconscious of the risks and how they can happen, people may then be unaware of the right to make a claim if something does happen. To hold companies to account, we can bring compensation claims against them on behalf of data breach victims.<\/p>\n<p>If you think you have been affected by a breach of data protection law, you can <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact us for advice on your potential claim.<\/strong><\/a><\/p>\n<p><!--more--><\/p>\n<h3><strong>What is synthetic identity theft?<\/strong><\/h3>\n<p>The term identity theft is commonly used to describe an instance where a criminal steals your personal data for misuse, often resulting in them impersonating you. They could use your personal information to obtain access to your accounts, to open new bank or financial accounts in your name, or to request new identity documents like driving licenses and passports.<\/p>\n<p>Synthetic identity theft differs from typical identity theft in that it can combine stolen personal data with fake details in order to construct a partially real identity profile of a person. The identity can also be created for fraudulent purposes, but its use can differ in some ways. Rather than stealing from a victim\u2019s account, synthetic identity theft can allow criminals to set up their own accounts, even being able to build up a good credit score before amassing significant debts on their credit cards. Having created a fake identity to execute the crime, the perpetrators of the synthetic identity theft can often be untraceable.<\/p>\n<h3><strong>Data breaches and synthetic identity theft<\/strong><\/h3>\n<p>Identity theft is still one of the major risks which victims of data breaches can be exposed to. While synthetic identity theft could be less likely to affect your bank balance than typical identity theft, it can still mean that criminals are using your personal details to commit a crime.<\/p>\n<p>As a result, while they can go undetected, their fraud could still be traced back to you.<\/p>\n<p>The growth of synthetic identity theft can also make data leaks more damaging, because criminals may need even fewer details to commit this type of fraud. It is, therefore, becoming easier for criminals to steal vast amounts of money as a result of small-scale data exposure.<\/p>\n<h3><strong>Making a data breach claim for cybercrime<\/strong><\/h3>\n<p>Many data breach victims suffer the effects of cybercrime as a result of the exposure of their personal information. Whether it be identity theft, phishing emails or scam calls, no consumer should have to face these risks because of the negligence of a third-party data controller, which is why the law can entitle data breach victims to make compensation claims. You could be eligible to recover <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>thousands of pounds in data breach damages<\/strong><\/a> to compensate you for the distress and financial loss caused.<\/p>\n<p>For <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>free, no-obligation advice, please do not hesitate to contact us today<\/strong><\/a> if you think you have a claim to make.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Personal data is an incredibly valuable resource for cybercriminals who are developing increasingly sophisticated ways of stealing personal information and using it to commit fraud. Although many people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people. It is a risk that everyone &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Synthetic identity theft \u2013 data breach claims advice<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2408,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,8,11,64,51],"tags":[16,2,26,55,10,20,13],"class_list":["post-4959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-hacking-news","category-scammers","category-security","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-online-security","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Synthetic identity theft \u2013 data breach claims advice - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Although people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Synthetic identity theft \u2013 data breach claims advice - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Although people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-09T07:00:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-18T15:12:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/data-theft-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Synthetic identity theft \u2013 data breach claims advice\",\"datePublished\":\"2021-06-09T07:00:42+00:00\",\"dateModified\":\"2021-06-18T15:12:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice\"},\"wordCount\":589,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/data-theft-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"online security\",\"personal data\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Hacking News\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice\",\"name\":\"Synthetic identity theft \u2013 data breach claims advice - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/data-theft-min.png\",\"datePublished\":\"2021-06-09T07:00:42+00:00\",\"dateModified\":\"2021-06-18T15:12:18+00:00\",\"description\":\"Although people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/data-theft-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/data-theft-min.png\",\"width\":725,\"height\":250,\"caption\":\"data theft risks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/synthetic-identity-theft-data-breach-claims-advice#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Synthetic identity theft \u2013 data breach claims advice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Synthetic identity theft \u2013 data breach claims advice - Data Leaks, Breaches &amp; Hacks","description":"Although people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice","og_locale":"en_GB","og_type":"article","og_title":"Synthetic identity theft \u2013 data breach claims advice - Data Leaks, Breaches &amp; Hacks","og_description":"Although people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2021-06-09T07:00:42+00:00","article_modified_time":"2021-06-18T15:12:18+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/data-theft-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Synthetic identity theft \u2013 data breach claims advice","datePublished":"2021-06-09T07:00:42+00:00","dateModified":"2021-06-18T15:12:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice"},"wordCount":589,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/data-theft-min.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","online security","personal data"],"articleSection":["Claims","Cybersecurity","Data","Hacking News","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice","name":"Synthetic identity theft \u2013 data breach claims advice - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/data-theft-min.png","datePublished":"2021-06-09T07:00:42+00:00","dateModified":"2021-06-18T15:12:18+00:00","description":"Although people may understand or have at least heard of identity theft, synthetic identity theft is a less familiar concept for many people.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/data-theft-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/data-theft-min.png","width":725,"height":250,"caption":"data theft risks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/synthetic-identity-theft-data-breach-claims-advice#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Synthetic identity theft \u2013 data breach claims advice"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4959"}],"version-history":[{"count":3,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4959\/revisions"}],"predecessor-version":[{"id":5013,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4959\/revisions\/5013"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2408"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}